Overview
Detect and respond to attacks using the same tools and techniques adversaries employ. Master incident handling through hands-on exercises that expose real-world attack patterns and defense strategies.
Adversaries constantly evolve their methods. SEC504 teaches security practitioners to think like attackers, enabling faster detection and more effective response. Over 30 hands-on labs immerse you in both offensive techniques and defensive countermeasures.
Cover the complete attack lifecycle:
Reconnaissance and Initial Access
- Discover targets through OSINT and network scanning
- Exploit common vulnerabilities for initial foothold
- Analyze phishing campaigns and social engineering tactics
- Identify indicators of compromise during early attack stages
Persistence and Lateral Movement
- Detect post-exploitation activities and persistence mechanisms
- Track credential theft and privilege escalation
- Follow attackers across network segments
- Identify command and control communications
Incident Response and Remediation
- Apply the six-step incident response process
- Collect and preserve digital evidence
- Contain active intrusions while maintaining business operations
- Eradicate threats and implement lessons learned
Build practical skills with industry-standard tools: Metasploit, Nmap, Wireshark, and forensic utilities. Understand attacker methodology so deeply that you anticipate their next move.
The course culminates in a full-day hands-on incident handling exercise simulating real-world breach response.
Earn GIAC GCIH certification (exam sold separately). 37 CPE credits across 6 intensive days.
Highlights
- Master both attacker and defender perspectives: Use exploitation frameworks, password cracking, and web application attacks to understand adversary methods, then apply that knowledge to detect intrusions and respond effectively.
- 44 hands-on labs covering Windows and Linux attacks, API exploitation, cloud vulnerabilities, malware analysis, memory forensics, and network investigation. Includes AI-driven learning experiences and the Office Infiltrator challenge.
- Prepares for GIAC GCIH certification. Built for incident responders, SOC analysts, and security practitioners who need to understand attacker techniques to defend against them. 6 days, 38 CPEs.
Details
Introducing multi-product solutions
You can now purchase comprehensive solutions tailored to use cases and industries.
Features and programs
Financing for AWS Marketplace purchases
Pricing
Dimension | Description | Cost/12 months |
|---|---|---|
SEC504 - Seat | Seat license for Offensive Ops - SEC504: Hacker Tools, Techniques, & Incident Handling | $8,780.00 |
Vendor refund policy
Refunds available within 30 days if course not accessed.
How can we make this page better?
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Software as a Service (SaaS)
SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.
Support
Vendor support
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.
Similar products
